Adopting Zero Trust offers an ongoing conversation that elevates cybersecurity conversations that encourages you to rethink how you build strategies, defend against threat actors, and implement new technology. We go beyond the millions in marketing budgets fueled by VCs, and chat with practitioners like you who want to make a difference (or hack the planet, which ever happens first). Hosted on Acast. See acast.com/privacy for more information.
📻 Siste episoder av Adopting Zero Trust
Her er de nyeste episodene tilgjengelige via RSS-feeden:
The Security Debt We Pretend Isn’t There (00:50:01)
As organizations push return-to-office (RTO) mandates and chase efficiency, many security teams are quietly accumulating debt they don’t know how to unwind.In this episode, we are joined by Lea Cure T...
Whisper Leak: How Encrypted AI Chats Still Leak Conversation Topics (00:31:37)
In this episode, we break down Whisper Leak, a newly disclosed side-channel issue affecting encrypted LLM communications. JBO explains how attackers can infer conversation topics using packet size and...
How Critical Infrastructure Leaders Are Rethinking Cybersecurity (00:44:32)
In this episode of Adopting Zero Trust, hosts Elliot Volkman and Neal Dennis discuss critical infrastructure security with expert guest Ian Branson, Vice President of Global Industrial Cybersecurity a...
Shadows Within Shadows: How AI is Challenging IT Teams (00:48:12)
In this episode of Adoption Zero Trust (AZT), host Neal Dennis and producer Elliot Volkman sit down with Bradon Rogers, Chief Customer Officer at Island, to discuss how AI is compounding the already e...
Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust (00:32:50)
Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here.Live from ThreatLocker’s Zero Trust World (ZTW), cybersecurity heavyweights Dave Bittner, host of CyberWire D...
Rapid fire update: Silk Typhoon and DOJ's indictment of twelve Chinese nationals (00:03:20)
New intelligence: Silk Typhoon, formerly tracked as HAFNIUM, is a China-based threat actor most recently observed targeting IT supply chains in the US. Today, we released a new report in conjunction w...
Predicting the year of cybersecurity ahead (minus regulations) (01:02:52)
It’s mid-February, but somehow, we’ve already been through what feels like a year's worth of change in the cybersecurity and regulation world. Beyond the standard incidents, outages, and attacks… ther...
Kicking Off Season 4 of Adoption Zero Trust (AZT) (00:22:43)
Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here.Neal and I are excited to welcome you back to AZT as we kick off our fourth season. After four years of tryin...
The key to growing a cybersecurity career are soft skills (00:50:38)
In this episode of 'Adopting Zero Trust (AZT)', host Neal Dennis and producer Elliot Volkman delve into the often-overlooked realm of soft or 'non-tech' skills in cybersecurity.This week, we chat with...
Behind the scenes of cybersecurity media and reporting (01:04:53)
Season 3, Episode 15: We gather a panel of journalists, communications, and a researcher to discuss how cybersecurity news and incidents are reported.You can read the show notes here.In the world of c...
GRC tool or spreadsheets, that is the question | GRC Uncensored Preview (00:43:13)
In our final preview episode of GRC Uncensored, we explore a particularly bipolar debate: do you need a GRC tool to manage compliance, or will spreadsheets suffice?After this, we will be back to our r...
Podcast Preview: GRC Uncensored and the commoditization of compliance (00:41:30)
We are interrupting our regularly scheduled podcast series to introduce you to a new series we developed: GRC Uncensored.This pilot season will elevate conversations about GRC that are often buried un...
How to prepare your operations team for Zero Trust (00:46:17)
Welcome back to Adopting Zero Trust! In this episode, hosts Elliot Volkman and Neal Dennis are joined by Rob Allen, Chief Product Officer of ThreatLocker, to dive deep into the operationalization of Z...
Log4j Continues to act as Organizational Vulnerability (00:47:56)
Season 3, Episode 13: Cato Network’s Etay Maor provides fresh research on the abuse of unpatched log4j libraries.Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes h...
Overturning of Chevron Deference’s Impact on Cybersecurity Regulation (00:51:44)
Season 3, Episode 12: Could the overturning of Chevron Deference impact cybersecurity and privacy regulations?Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here...
Applying Vulnerability Management to Zero Trust (00:45:43)
Season 3, Episode 11: Vulnerability management is critical to any Zero Trust strategy, but you probably already know that. Fortra’s Tyler Reguly breaks down severity vs. risk.Catch this episode on You...
The Unstoppable Phish: A Discussion with Vivek Ramachandran (00:26:31)
Season 3, Episode 10: Elliot chat’s with Vivek Ramachandran of SquareX about his approach to tackling the impossible: Social engineering.Catch this episode on YouTube, Apple, Spotify, Amazon, or Googl...
Breaking Down the SMB Threat Landscape and The Value of MSPs with SonicWall (00:46:22)
Season 3, Episode 9: We chat with SonicWall’s Doug McKee about the top 5 threats targeting SMBs based on recent research.Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read ...
Decoding Emerging Threats: MITRE, OWASP, and Threat Intel (00:25:00)
Season 3, Episode 8: AZT and Dr. Zero Trust have a crossover episode where we chat with reps from MITRE and OWASP about challenges associated with emerging threats.Catch this episode on YouTube, Apple...
Navigating the Ever-Changing Landscape of Cybersecurity Regulations With Lacework and Drata (00:30:10)
Season 3, Episode 7: Though regulation impacting cybersecurity moves slow, when new laws are introduced it often puts significant strain on companies. Lacework’s Tim Chase and Drata’s Matt HIllary dis...
Ransomware: To Pay or Not to Pay? (00:59:08)
Season 3, Episode 6: Two seasoned cybersecurity professionals, Bryan Willett and Kris Lovejoy, shed light on the dilemma organizations face when hit by ransomware: Should they pay the ransom or not?Ca...
Season 3, Episode 5: Cyber Insurance may not be the sexiest topic, but it’s an important piece of any mature cyber program. We chatted with a lawyer and a VC who share their perspective.Catch this epi...
The Current and Future State of Zero Trust With Forrester’s David Holmes (00:54:05)
Season 3, Episode 4: Forrester Principal Research Analyst on Zero Trust, David Holmes, shares his perspective on the current and future state of Zero Trust.Catch this episode on YouTube, Apple, Spotif...
Canva's Kane Narraway on Building a Zero Trust MVP (00:46:10)
Season 3, Episode 3: Canva’s Head of Enterprise Security, Kane Narraway, discusses how to deploy a Zero Trust strategy in under a year.Catch this episode on YouTube, Apple, Spotify, Amazon, or Google....
AZT: Quit Bugging the CISO + CIO (00:46:58)
Season 3, Episode 2: In our conversation with Energy Solution’s CIO David Weisong we chat about how new processes, technology, and budgets are formed. Catch this episode on YouTube, Apple, Spotify, Am...
Side 1 av 2
Adopting Zero Trust - Gratis RSS Feed for Norsk Podcast | OpenPodMe | OpenPodMe - Åpen RSS for Norske Podcaster